Abstract: In this paper we explore the application of a formal proof system to verification problems in cryptography. Cryptographic properties concerning correctness or security of some cryptographic algorithms are of great interest. Beside some basic lemmata, we explore an implementation of a complex function that is used in cryptography. More precisely, we describe formal properties of this implementation that we computer prove. We describe formalized probability distributions (o--algebras, probability spaces and condi¬tional probabilities). These are given in the formal language of the formal proof system Isabelle/HOL. Moreover, we computer prove Bayes' Formula. Besides we describe an application of the presented formalized probability distributions to cryptography. Furthermore, this paper shows that computer proofs of complex cryptographic functions are possible by presenting an implementation of the Miller- Rabin primality test that admits formal verification. Our achievements are a step towards computer verification of cryptographic primitives. They describe a basis for computer verification in cryptography. Computer verification can be applied to further problems in crypto-graphic research, if the corresponding basic mathematical knowledge is available in a database.
Abstract: Longitudinal data typically have the characteristics of
changes over time, nonlinear growth patterns, between-subjects
variability, and the within errors exhibiting heteroscedasticity and
dependence. The data exploration is more complicated than that of
cross-sectional data. The purpose of this paper is to organize/integrate
of various visual-graphical techniques to explore longitudinal data.
From the application of the proposed methods, investigators can
answer the research questions include characterizing or describing the
growth patterns at both group and individual level, identifying the time
points where important changes occur and unusual subjects, selecting
suitable statistical models, and suggesting possible within-error
variance.
Abstract: A real-time tracking system was built to track performers on an interactive stage. Using an ordinary, up to date, desktop workstation, the performers- silhouette was segmented from the background and parameterized by calculating the normalized central image moments. In the stage system, the silhouette moments were then sent to a parallel workstation, which used them to generate corresponding 3D virtual geometry and projected the generated graphic back onto the stage.
Abstract: Eco-driving allows the driver to optimize his/her behaviour in order to achieve several types of benefits: reducing pollution emissions, increasing road safety, and fuel saving. One of the main rules for adopting eco-driving is to anticipate the traffic events by avoiding strong acceleration or braking and maintaining a steady speed when possible. Therefore, drivers have to comply with speed limits and time headway. The present study explored the role of three types of motivation and social norms in predicting French drivers- intentions to comply with speed limits and time headway as eco-driving practices as well as examine the variations according to gender and age. 1234 drivers with ages between 18 and 75 years old filled in a questionnaire which was presented as part of an online survey aiming to better understand the drivers- road habits. It included items assessing: a) behavioural intentions to comply with speed limits and time headway according to three types of motivation: reducing pollution emissions, increasing road safety, and fuel saving, b) subjective and descriptive social norms regarding the intention to comply with speed limits and time headway, and c) sociodemographical variables. Drivers expressed their intention to frequently comply with speed limits and time headway in the following 6 months; however, they showed more intention to comply with speed limits as compared to time headway regardless of the type of motivation. The subjective injunctive norms were significantly more important in predicting drivers- intentions to comply with speed limits and time headway as compared to the descriptive norms. In addition, the most frequently reported type of motivation for complying with speed limits and time headway was increasing road safety followed by fuel saving and reducing pollution emissions, hence underlining a low motivation to practice eco-driving. Practical implications of the results are discussed.
Abstract: Having a very many number of pipelines all over the
country, Iran is one of the countries consists of various ecosystems
with variable degrees of fragility and robusticity as well as
geographical conditions. This study presents a state-of-the-art method
to estimate environmental risks of pipelines by recommending
rational equations including FES, URAS, SRS, RRS, DRS, LURS
and IRS as well as FRS to calculate the risks. This study was carried
out by a relative semi-quantitative approach based on land uses and
HVAs (High-Value Areas). GIS as a tool was used to create proper
maps regarding the environmental risks, land uses and distances. The
main logic for using the formulas was the distance-based approaches
and ESI as well as intersections. Summarizing the results of the
study, a risk geographical map based on the ESIs and final risk score
(FRS) was created. The study results showed that the most sensitive
and so of high risk area would be an area comprising of mangrove
forests located in the pipeline neighborhood. Also, salty lands were
the most robust land use units in the case of pipeline failure
circumstances. Besides, using a state-of-the-art method, it showed
that mapping the risks of pipelines out with the applied method is of
more reliability and convenience as well as relative
comprehensiveness in comparison to present non-holistic methods for
assessing the environmental risks of pipelines. The focus of the
present study is “assessment" than that of “management". It is
suggested that new policies are to be implemented to reduce the
negative effects of the pipeline that has not yet been constructed
completely
Abstract: Accurate assessment of the primary tumor response to
treatment is important in the management of breast cancer. This
paper introduces a new set of treatment evaluation indicators for
breast cancer cases based on the computational process of three
known metrics, the Euclidian, Hamming and Levenshtein distances.
The distance principals are applied to pairs of mammograms and/or
echograms, recorded before and after treatment, determining a
reference point in judging the evolution amount of the studied
carcinoma. The obtained numerical results are indeed very
transparent and indicate not only the evolution or the involution of
the tumor under treatment, but also a quantitative measurement of the
benefit in using the selected method of treatment.
Abstract: Sleep spindles are the most interesting hallmark of
stage 2 sleep EEG. Their accurate identification in a
polysomnographic signal is essential for sleep professionals to help
them mark Stage 2 sleep. Sleep Spindles are also promising objective
indicators for neurodegenerative disorders. Visual spindle scoring
however is a tedious workload. In this paper three different
approaches are used for the automatic detection of sleep spindles:
Short Time Fourier Transform, Wavelet Transform and Wave
Morphology for Spindle Detection. In order to improve the results, a
combination of the three detectors is presented and comparison with
human expert scorers is performed. The best performance is obtained
with a combination of the three algorithms which resulted in a
sensitivity and specificity of 94% when compared to human expert
scorers.
Abstract: Microtomographic images and thin section (TS)
images were analyzed and compared against some parameters of
geological interest such as porosity and its distribution along the
samples. The results show that microtomography (CT) analysis,
although limited by its resolution, have some interesting information
about the distribution of porosity (homogeneous or not) and can also
quantify the connected and non-connected pores, i.e., total porosity.
TS have no limitations concerning resolution, but are limited by the
experimental data available in regards to a few glass sheets for
analysis and also can give only information about the connected
pores, i.e., effective porosity. Those two methods have their own
virtues and flaws but when paired together they are able to
complement one another, making for a more reliable and complete
analysis.
Abstract: METIS is the Multi Element Telescope for Imaging
and Spectroscopy, a Coronagraph aboard the European Space
Agency-s Solar Orbiter Mission aimed at the observation of the solar
corona via both VIS and UV/EUV narrow-band imaging and spectroscopy. METIS, with its multi-wavelength capabilities, will
study in detail the physical processes responsible for the corona heating and the origin and properties of the slow and fast solar wind.
METIS electronics will collect and process scientific data thanks to its detectors proximity electronics, the digital front-end subsystem
electronics and the MPPU, the Main Power and Processing Unit,
hosting a space-qualified processor, memories and some rad-hard
FPGAs acting as digital controllers.This paper reports on the overall
METIS electronics architecture and data processing capabilities
conceived to address all the scientific issues as a trade-off solution between requirements and allocated resources, just before the
Preliminary Design Review as an ESA milestone in April 2012.
Abstract: Landscape connectivity combines a description of the
physical structure of the landscape with special species- response to
that structure, which forms the theoretical background of applying
landscape connectivity principles in the practices of landscape
planning and design. In this study, a residential development project in
the southern United States was used to explore the meaning of
landscape connectivity and its application in town planning. The vast
rural landscape in the southern United States is conspicuously
characterized by the hedgerow trees or groves. The patchwork
landscape of fields surrounded by high hedgerows is a traditional and
familiar feature of the American countryside. Hedgerows are in effect
linear strips of trees, groves, or woodlands, which are often critical
habitats for wildlife and important for the visual quality of the
landscape. Based on geographic information system (GIS) and
statistical analysis (FRAGSTAT), this study attempts to quantify the
landscape connectivity characterized by hedgerows in south Alabama
where substantial areas of authentic hedgerow landscape are being
urbanized due to the ever expanding real estate industry and high
demand for new residential development. The results of this study
shed lights on how to balance the needs of new urban development and
biodiversity conservation by maintaining a higher level of landscape
connectivity, thus will inform the design intervention.
Abstract: In this paper, a two factor scheme is proposed to
generate cryptographic keys directly from biometric data, which
unlike passwords, are strongly bound to the user. Hash value of the
reference iris code is used as a cryptographic key and its length
depends only on the hash function, being independent of any other
parameter. The entropy of such keys is 94 bits, which is much higher
than any other comparable system. The most important and distinct
feature of this scheme is that it regenerates the reference iris code by
providing a genuine iris sample and the correct user password. Since
iris codes obtained from two images of the same eye are not exactly
the same, error correcting codes (Hadamard code and Reed-Solomon
code) are used to deal with the variability. The scheme proposed here
can be used to provide keys for a cryptographic system and/or for
user authentication. The performance of this system is evaluated on
two publicly available databases for iris biometrics namely CBS and
ICE databases. The operating point of the system (values of False
Acceptance Rate (FAR) and False Rejection Rate (FRR)) can be set
by properly selecting the error correction capacity (ts) of the Reed-
Solomon codes, e.g., on the ICE database, at ts = 15, FAR is 0.096%
and FRR is 0.76%.
Abstract: Morgan-s refinement calculus (MRC) is one of the
well-known methods allowing the formality presented in the program
specification to be continued all the way to code. On the other hand,
Object-Z (OZ) is an extension of Z adding support for classes and
objects. There are a number of methods for obtaining code from OZ
specifications that can be categorized into refinement and animation
methods. As far as we know, only one refinement method exists
which refines OZ specifications into code. However, this method
does not have fine-grained refinement rules and thus cannot be
automated. On the other hand, existing animation methods do not
present mapping rules formally and do not support the mapping of
several important constructs of OZ, such as all cases of operation
expressions and most of constructs in global paragraph. In this paper,
with the aim of providing an automatic path from OZ specifications
to code, we propose an approach to map OZ specifications into their
counterparts in MRC in order to use fine-grained refinement rules of
MRC. In this way, having counterparts of our specifications in MRC,
we can refine them into code automatically using MRC tools such as
RED. Other advantages of our work pertain to proposing mapping
rules formally, supporting the mapping of all important constructs of
Object-Z, and considering dynamic instantiation of objects while OZ
itself does not cover this facility.
Abstract: The optimal bisection width of r-dimensional N×
· · ·× N grid is known to be Nr-1 when N is even, but when
N is odd, only approximate values are available. This paper
shows that the exact bisection width of grid is Nr
-1
N-1 when N is odd.
Abstract: In this paper our aim is to explore the construction of schoolgirl femininities, drawing on the results of an ethnographic study conducted in a high school in Ankara, Turkey. In this case study which tries to explore the complexities of gender discourses, we were initially motivated by the questions that have been put forward by critical and feminist literature on education which emphasize the necessarily conflicting and partial nature of both reproduction and resistance and the importance of gendered power relations in the school context. Drawing on this paradigm our research tries to address to a more specific question: how are multiple schoolgirl femininities constructed within the context of gendered school culture, and especially in relation to hegemonic masculinity? Our study reveals that the general framework of multiple femininities is engendered by a tension between two inter-related positions. The first one is different strategies of accommodation and resistance to the gender-related problems of education. The second one is the school experience of girls which is conditioned by their differential position vis-à-vis the masculine resistance culture that is dominant in the school.
Abstract: To understand the material characteristics of singleand
poly-crystals of pure copper, the respective relationships between
crystallographic orientations and microstructures, and the bending
and mechanical properties were examined. And texture distribution
is also analyzed. A bending test is performed in a SEM apparatus and
while its behaviors are observed in situ. Furthermore, some
analytical results related to crystal direction maps, inverse pole
figures, and textures were obtained from EBSD analyses.
Abstract: The distressing flood scenarios that occur in
recent years at the surrounding areas of Sarawak River have
left damages of properties and indirectly caused disruptions of
productive activities. This study is meant to reconstruct a 100-year
flood event that took place in this river basin. Sarawak River Subbasin
was chosen and modeled using the one-dimensional
hydrodynamic modeling approach using InfoWorks River Simulation
(RS), in combination with Geographical Information System (GIS).
This produces the hydraulic response of the river and its floodplains
in extreme flooding conditions. With different parameters introduced
to the model, correlations of observed and simulated data are
between 79% – 87%. Using the best calibrated model, flood
mitigation structures are imposed along the sub-basin. Analysis is
done based on the model simulation results. Result shows that the
proposed retention ponds constructed along the sub-basin provide the
most efficient reduction of flood by 34.18%.
Abstract: This paper is a continuation of our interest in the influence of temperature on specific retention volumes and the resulting infinite dilution activity coefficients. This has a direct effect in the design of absorption and stripping columns for the abatement of volatile organic compounds. The interaction of 13 volatile organic compounds (VOCs) with polydimethylsiloxane (PDMS) at varying temperatures was studied by gas liquid chromatography (GLC). Infinite dilution activity coefficients and specific retention volumes obtained in this study were found to be in agreement with those obtained from static headspace and group contribution methods by the authors as well as literature values for similar systems. Temperature variation also allows for transport calculations for different seasons. The results of this work confirm that PDMS is well suited for the scrubbing of VOCs from waste gas streams. Plots of specific retention volumes against temperature gave linear van-t Hoff plots.
Abstract: Many researchers are working on information hiding
techniques using different ideas and areas to hide their secrete data.
This paper introduces a robust technique of hiding secret data in
image based on LSB insertion and RSA encryption technique. The
key of the proposed technique is to encrypt the secret data. Then the
encrypted data will be converted into a bit stream and divided it into
number of segments. However, the cover image will also be divided
into the same number of segments. Each segment of data will be
compared with each segment of image to find the best match
segment, in order to create a new random sequence of segments to be
inserted then in a cover image. Experimental results show that the
proposed technique has a high security level and produced better
stego-image quality.
Abstract: The link between coordinate transformations in the plane and their effects on the graph of a function can be difficult for students studying college level mathematics to comprehend. To solidify this conceptual link in the mind of a student Microsoft Excel can serve as a convenient graphing tool and pedagogical aid. The authors of this paper describe how various transformations and their related functional symmetry properties can be graphically displayed with an Excel spreadsheet.
Abstract: An Artificial Neural Network based modeling
technique has been used to study the influence of different
combinations of meteorological parameters on evaporation from a
reservoir. The data set used is taken from an earlier reported study.
Several input combination were tried so as to find out the importance
of different input parameters in predicting the evaporation. The
prediction accuracy of Artificial Neural Network has also been
compared with the accuracy of linear regression for predicting
evaporation. The comparison demonstrated superior performance of
Artificial Neural Network over linear regression approach. The
findings of the study also revealed the requirement of all input
parameters considered together, instead of individual parameters
taken one at a time as reported in earlier studies, in predicting the
evaporation. The highest correlation coefficient (0.960) along with
lowest root mean square error (0.865) was obtained with the input
combination of air temperature, wind speed, sunshine hours and
mean relative humidity. A graph between the actual and predicted
values of evaporation suggests that most of the values lie within a
scatter of ±15% with all input parameters. The findings of this study
suggest the usefulness of ANN technique in predicting the
evaporation losses from reservoirs.